Search This Blog

Tuesday, March 24, 2009

Selling security without scare tactics; 10 IE Browser Settings for Safer Surfing

Arguments for selling security that vendors and IT managers should have in their arsenal
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Radware
rule

Radware Introducing Radware's VirtualDirector
Business-Smart Automation for Optimizing Your Virtualized Data Center in Real-time. Ensures SLAs. Improves Quality of Experience. Reduces Physical-2-Virtual Risk. Deploy in the Cloud. Learn More.

rule

Spotlight Story

Selling security without scare tactics
Using fear, uncertainty and doubt (FUD) is easy for security vendors, as well as IT managers pitching security purchases to the business team. But other approaches may work better, argues Ruvi Kitov, CEO of Tufin Technologies. Kitov speaks with Keith Shaw about four other arguments that security vendors and IT managers should have in their arsenal. (12:30) Listen now.

Related News:

10 IE Browser Settings for Safer Surfing Ask a room full of security practitioners for a list of security settings that'll make Internet Explorer (IE) safe to use and you'll either hear laughter or advice to get a new browser like Mozilla Firefox, Opera, Safari or Google Chrome.

InDorse unwraps data-protection suite InDorse Technologies unveiled a security software suite aimed at protecting data in Microsoft SharePoint environments.

Site Hacks, Fake Security Rakes in Serious Cash Here's a recipe for illicit online riches...

Fight Phishers With Comodo VerificationEngine Modern Web browsers normally do a terrific job of security, but freebie Comodo VerificationEngine takes it several steps further. Designed as an anti-phishing add-on for many browsers, VerificationEngine uses basic color codes (green for go, red for stop) to give you the goods on sites you visit.

Free tool from HP scans for Flash vulnerabilities HP has released a free development tool that finds vulnerabilities in Flash, Adobe System's widely used but occasionally buggy interactive Web technology.

Study: Most Organizations Hit by Cybercrime A report released Monday by Symantec gauges the far reaching impact of cybercrime and finds most organizations have dealt with a cyber attack of some kind in the last two years.

Symantec says credit card data may have leaked from India Symantec said on Monday that credit card information relating to three of its customers may have been leaked from its call center contractor in India.

Spam filters block legitimate e-mail, finds test Many antispam products still block an inconvenient amount of legitimate e-mail, a new test of leading products has suggested.

E-mail evidence in Madoff case includes another scam U.S. attorneys prosecuting fraudster Bernard Madoff submitted letters from victims of his Ponzi scheme to the presiding judge on March 9 in the form of e-mail messages, but they appear to have mistakenly included evidence of a scam of a different sort in the filing.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Radware
rule

Radware Introducing Radware's VirtualDirector
Business-Smart Automation for Optimizing Your Virtualized Data Center in Real-time. Ensures SLAs. Improves Quality of Experience. Reduces Physical-2-Virtual Risk. Deploy in the Cloud. Learn More.

rule

The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.


What you need to see all 7 layers
Get all the tools you need to see all 7 layers of your network. Fluke's OptiView Analyzer combines protocol analysis, active discovery, and device and traffic analysis in a mobile solution, giving you the information you need to control your network and minimize disruption.
Click here for your free trial.

 

03/24/09

Today's most-read stories:

  1. No business case for IPv6, survey finds
  2. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  3. IBM/Sun deal could benefit Java, says Google's open source chief
  4. Skype for SIP targets business customers
  5. Voluntary separation scheme for Dell's Malaysian staff
  6. Hidden commands
  7. Ukrainian cybercriminals raked in $10K/day, Finjan reports
  8. E-mail evidence in Madoff case includes another scam
  9. Power grid is found susceptible to cyberattack
  10. Tweeted out of a job: "Cisco Fatty" story
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: